Showing posts with label cisco. Show all posts
Showing posts with label cisco. Show all posts

Tuesday, 2 September 2025

Doing MD5 checksum check on cisco FMC install file

 A client AV detected as malware so I wanted to confirm the hash 

certutil is built in so I used that but there are some free GUI tools

certutil -hashfile Cisco_Secure_FW_Mgmt_Center_Upgrade-7.2.9-44.sh.REL.tar MD5 | find /v "hash"

Compare the result to the MD5 hash on cisco.com downloads section. If you hover the version the MD5 and SHA1 hashes will be there to copy.

Friday, 7 March 2025

switch aaa and radius authentication settings for duo etc

 aaa group server radius DUO-AUTH

aaa authentication login default group DUO-AUTH local

aaa authentication login CON-LOCAL local



aaa group server radius DUO-AUTH

 server name DUO-AUTH-PROXY

 ip radius source-interface Vlan2


radius server DUO-AUTH-PROXY

 address ipv4 192.168.1.1 auth-port 18122 acct-port 18122

 pac key 7 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx


Wednesday, 5 March 2025

find what DH group an ikev1 S2S VPN is using in ASA

Move away from Groups 2, 5, 24. 

DH Groups 2, 5, 24 are considered insecure and are deprecated in FTD’s running 6.5/6.6 and will be removed in a later version.

check 6.7 and 7.1 release notes and search for group 5

https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/vpn-s2s.html? 


IKEv1

show vpn-sessiondb detail l2l filter ipaddress x.x.x.x

Look for "D/H Group" in IKEv1 section

sh crypto isakmp sa detail | i Grp:


sh crypto isakmp sa | i PFS Group 2,

Looking for groups 2 and 5

 sh crypto isakmp sa detail | i Grp:2,

 sh crypto isakmp sa detail | i Grp:5,


Can copy the full output of " sh crypto isakmp sa detail" to a text file and search

Tuesday, 12 December 2023

find ip addresses on switch

No one good way to do this, depends on variables. Some commands may help 

sh ip arp (only works if you have l3 interfaces in each vlan)

sh ip dhcp snooping binding (needs dhcp snooping)


sh ip device tracking interface gigabitEthernet 

Tuesday, 17 October 2023

Cisco ISE notes

ISE

Test lab is quite involved

  • Need windows AD
  • ISE
  • VMware
  • Cisco anyconnect 
  • Cisco switch (supports 802.1x)
  • Client PCs connected to the switch
  • Wifi AP might also be useful
  • SFTP server

802.1.x intro
Don't allow any traffic on the  port until we know who the client is
Authenticator
Authentication server RADIUS -> (ISE)
Supplicant (supply credentials)

Supplicant -> Authenticator -> Auth Server
 
We can also do posture assessment of the client

VM settings
Download .ISO or .OVA from Cisco

200GB thin provision
4 GB RAM (more better)
4 cores or more better
SSD hard drives faster


Logging into ISE after install
https://x.x.x.x  (IP or Name)
username: admin
password: set during install


First steps
Download .ISO or .OVA from Cisco
Administration -> network device group
ISE is security product so needs to be kept patched.

In VMware vShpere
Right click on cluster -> Deploy OVF template
Choose upload

You can also try
New -> Virtual machine -> Deploy from Template 

You can also browse into the datastores:
https://192.168.10.100/folder





Deploy OVA VM (set network adapters)
Console
setup (to run script)
hostname
ip address 10.4.9.21
subnet mask 255.255.255.0
default gateway 10.4.9.254
default dns domain    corkcoco.localgov
DNS server    10.4.9.162 / 10.4.10.16
NTP server 10.4.253.1    
Syslog server s.s.s.s
timezone
y to enable ssh
username
password
confirm password


Web interface
Check running version by clicking the cog in the top right -> about ISE and Server


Burger menu in the top left -> Administration -> deployment
Click on your ServerName / ISE node (our server)
You can click "Make primary" (it will need to reboot) to setup HA

Scroll down
Enable device administration service tickbox
RADIUS/TACACS are not encrypted by default

Profiling configuration
Burger menu in the top left -> Administration -> deployment
Go onto "Profiling Configuration" tab
Turn on HTTP (get the user agent)
Turn on DNS
Click Save

Licensing
We will use eval license. 
For production you will need to purchase a license

Certificates
Managing digital certificates with ISE (video on youtube)
Resources:
ISE Webinars: https://cs.co/ise-webinars 
ISE YouTube Channel: https://cs.co/ise-videos  
ISE Resources: https://cs.co/ise-resources  
ISE Community: https://cs.co/ise-community   
ISE Security Integration Guides: https://cs.co/ise-guides
ISE API: https://cs.co/ise-api
ISE NAD Capabilities: https://cs.co/nad-capabilities
ISE Licensing & Evaluations: https://cs.co/ise-licensing

Logging
Burger menu in the top left -> Administration -> Logging
We can add syslog server(s)

old school syslog UDP
new TCP (more reliable)
secure syslog (TCP + encryption)

Syslog UDP 514    (clear text)
Syslog TCP 1468   (clear text)
Secure Syslog TCP 6514 (encrypted)

Facility code is like severity level (LOCAL6 is default / informational)

Maximum 8192
Include alarms 
Comply with RFC 3164
Buffer messages when server down, buffer size 100MB
click Submit

Logging categories
Add your syslog server to the categories
AAA Audit
Failed attempts
Passed authentications
AAA diagnostics
Administrator authentication

Meraki
We can connect meraki APs
Edit settings is WIFI SSID
Configure the ISE server as the radius server + password and click test
input a domain username and password
We need to config it on the ISE end

Logging -> Message Catalog
To see more info on logs the ID's to messages
Can be exported to CSV
Filter on ID 5405 RADIUS request dropped

Logging -> Connection filters
We can filter out noisy clients here, a WIFI AP that is broken and keeps sending auth requests filling up logs for example

Maintenance -> Repository
You will need an SFTP repo for upgrades (and also restore)
Burger menu in the top left -> Administration -> Maintenance 
Add LOCALDISK root path submit

Can add remote servers
FTP
SFTP
TFTP
NFS
CDROM
HTTP
HTTPS

Submit

Upload a patch to ISE server from web interface
  • For patches we don't need to do the same level of backups as major upgrade versions but always best to take backups before starting
  • Download patch file from cisco.com
  • You will need SFTP server to transfer to ISE or upload via GUI
  • Burger menu in the top left -> Administration -> Maintenance -> Localdisk Management
  • We can upload patch bundle file (downloaded from cisco)
  • Select hot patch file .tar.gz
  • We can appy later ISE will need to restart to install

Apply patch via CLI (so we can see some progress)
  • We will have uploaded the patch file to local disk repo already
  • Start a cmd (ping -t) to ISE server
  • Start a putty session with logging to the ISE server
  • show repository
  • patch install patch.tar.gz LOCALDISK
  • yes
  • "Getting bundle to local machine"
  • That will take about 10 minutes before next output
  • Once the patch is installed the ISE server will reboot
  • You can ssh in again and check "show version" to check version

Maintenance -> Operational data purging
You can select how long before you delete logs
The longer you keep logs the more disk space you need
Enable export repo will export the logs before they are deleted

Upgrade
On latest version so no need for upgrade but this is where you can do it
Check health check first

Health Checks
Burger menu in the top left -> Administration -> Health Checks
Run before upgrades
Upgrade readiness tool, worth running after fresh install for a base line.
Can download the report

Backup and restore
You will need to make repos. Maintenance > repository 
Use SFTP as it supports backup and restore from here
Burger menu in the top left -> Administration -> Backup & Restore
Config is light (the main backup we want)
Operational has logs (for TS'ing issues)
We can save to localdisk or remote server we configure
It does not backup your certs you will need to store them manually in a safe place
You need to config a backup schedule.
Cisco only supports backup from their backup VM snapshot etc is not supported because of database issues that occur with those.
You can also backup xml config from Administration > Backup & Restore > Policy Export. 

Admin access
Burger menu in the top left -> Administration -> Admin Access 
Authentication (on left) -> Password policy (tab in middle)  -> Password Lifetime
Turn off
Click save


RBAC
Role based access control policy
If you want to setup limited admins
ERS admin - API

Connect to AD (interactive help top right)
External identity sources
Active directory -> 
join point name dcloud.cisco.com
ad domain dcloud.cisco.com
submit
Yes join nodes
Fill in AD username and password

Groups
Add groups from AD
Retrieve groups 
If you have a big org this could take a long time
Select the groups we want to use for auth
You may want to make some AD groups
ISE-ADMINS
ISE-READ-ONLY
etc

Can change authentication to AD


Admin access -> Settings -> Access
Can set banner logs
Can set ASCII for the CLI login
Save
Session timeout default is 60

Session info shows whos logged in

Settings

Client provisioning (not on day1)
FIPS mode (strong security, turns off clear text protocols/old ciphers, can cause issues)
Security settings turn off TLS1.0 (may restart)

Alarm settings

Posture
Cover  later

Profiling
Can leave default

Enable session resunme and fast reconnect
EAP-FAST
PEAP

RADIUS
Should be nothing to change day1

DTLS tunnels can be enabled

Proxy
For ISE internet updates


SMTP server
Email server for ISE to
Settings -> SMS gateway

NTP servers pool.ntp.org
time.nist.gov


Settings -> API settings

API service settings
enable ERS and openAPI

Deploy a patch on CLI
Example is log4j patch
SSH into ISE box

Show what patches have been applied
show logging application hotpatch.log

application install ise-apply-patch-name-SPA.tar.gz LOCALDISK

Deploy a patch via API
Use the rest API to install the patch with curl
curl --insecure --include --user admin:passw0rd -H "accept: applicaiton.jsopn" -H "Content-Type: applicaiton/json" -X POST https://ise.demo.com:443/api/hotpatch/install -d '{"hotpatchName": ise-apply-patch-name-SPA.tar.gz", "repositoryName:"LOCALDISK" }'

Task status
curl
--insure
--include
--user admin:passw0rd
-H "accept: application/json"
-X GET https://ise.demo.com:443/api/v1/task/[task-id]


One node we can update manually but if we have 50 nodes it would be useful to patch them all with one command.


Older version (300-208 SISAS)
Admin -> Network device groups
Create a group (test switch)
Admin -> Network device -> Add
ping between the switch and the ISE server and other direction

Radius 1812/1813
TACACS encrypts the whole session
RADIUS only encrypts the important parts like passwords

Give radius secret
submit

conf t
aaa new-mode
aaa authentication login default enable
radius server ISE
address ipv4 192.168.1100 auth-port 1812 acct-port 1813

aaa group server radius ISE-group
server name ISE

radius-server vsa send authenticaiton
radius-server vsa send accounting 
ip device tracking 


802.1x auth
EAP (clear text)
EAP TTLS (tunnelled some security)

PEAP (tunnelled so its secure) (protected EAP)
TLS implies we have certs, self signed, CA issued, vendor issued

Monitor mode first - lets all traffic through but we can see
Low impact - some ACLs on the port
closed - no traffic until authenticaiton

Bob user - may need to auth
BobPC - is a computer 

We may want to auth the user and the hardware

We can have phone and then a PC, the PC can be running VMs so we can see multiple macs on one port.

Single host - 1 mac only will be authenticated
multi-host - don't use, use authenticated the port is open
multi-domain - voice + data. 1 mac from voice, 1 mac from data
multi-auth - each device will need to autenticate
MAB - old printers won't have a supplicant so we can allow by MAC when the other methods fail. This is not best practice but can get you out of a hole.

test aaa group ISE-GROUP bob p4ssw0rd new-code

User ISE server for dot1x
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa accounting dot1x default start-stop group radius
radius-server attribute 8 include-in-access-req
dot1x system-auth-control 


switchport mode access
spanning-tree port fast
authentication host-mode multi-auth
authentication open
authentication periodic
authentication timer reauthenticate server
dot1x pae authenticator 
dot1x timeout tx-period 10
authenticaiton port-conrol auto
no shut

show dot1x all

Connect ISE server to AD
Policy set triggers if conditions are met
If yes the authentication polocys rules are checked 
If device is wired 802.1 then use our DC for auth
If that passes go to authorization policy
If the user had a valid AD username and password then let them in
Default network access is that large set of EAP protocols

Authorization policies:
Policy elements (Policy -> Policy elements)

Policy -> Policy elements - > Authorization -> Downloadable ACLs
We can push an ACL down onto the switch (we can use allow all IPv4 traffic)

Policy -> Policy elements - > Authorization -> Authorization profiles
We can assign what VLAN

show commands:
show authentication sessions
show authentication sessions interface fa0/1
show authentication sessions mac xxxx.xxxx,xxxx details
show interface status 

Live logs in ISE GUI:
Search for MAC
Click the details ICON to get a full report
Blue icon means we have a session

Sample ISE switchport with details:
switchport host 
switchport access vlan 999 (this is a holding vlan / dead end)
authentication priority dot1x mab (use dot1x over mab)
authentication order dot1x mab (try auth with dot1x, if it fails then mab)

authentication event fail action next-method (if dot1x fails try next which is mab)
authentication event server dead action authorize vlan 10 (If ISE dead put them on vlan 10)
authentication event server alive action reinitialize (when the server comes back re auth)
authentication host-mode multi-domain (1 device in voice and 1 data vlan can get authorized)
single-host just one device gets authorised (good if you have single PC)
multi-host (once the first hosts auths everything after gets auth, usually bad)
multi-auth (everyone can get on but must be auth)

authentication violation restrict (send log message and block additional mac)
protect (Drops unexpected incoming MAC addresses. No syslog errors are generated.)
replace (Removes the current session and initiates authentication with the new host.)
shutdown (Error-disables the port or the virtual port on which an unexpected MAC address occurs.)
restrict (Generates a syslog error when a violation error occurs. Puts port in restricted mode ignoring the new mac)

authentication open (if doesn't have supplicant no 802.1x / mab it will allow it through)

mab (enable MAB)

dot1x pae authenticator (tells the switch on this port it should be the authenticator)
dot1x timeout tx-period 5 (how long to wait for dot1x answer before trying next [mab])

authentication port-control auto (lets use 802.1x and control this port based on the ISE rules)

Find out if you switch supports dot1x commands
cisco.com/go/fn

Check 802.1x services
services.msc
look for wired autoconfig
changed to started + automatic

If we take Wireshark we will see EAP requests
wireshark display filter "eap"
Looks for request

Properties on network card
authentication tab at the top
Enable IEEE 802.1x authentication
MS-PEAP
settings -> validate server cert is off (self signed cert)
configure 
additional settings 
user auth 
save credentials -> fill in username and password

Installing an internal CA cert
Browse to your internal CA
http://192.168.1.50/certsrv
Download a CA certificate, chain or CRL
Select DER encoding
Download CA cert
Name it Root-Internal-CA.crt
Save

In ISE
System -> certificates
Import -> select the Internal CA cert
Give a friendly game
Trust for all

Create CSR
Local certs -> Add -> Generate a CSR
CN=ise.lab.com
2048
SHA256

Go to CSR
Export
Save -> CSR-from-ISE.pem
Open the file and copy all the CSR text

Go back to http://192.168.1.50/certsrv
Request a certificate 
Advanced certificate request
Submit a certificate request 
Paste the csr text
Click submit

Admin must approve
Server manger -> CA -> Pending requests -> right click and issue

Go back to http://192.168.1.50/certsrv
View the pending 
Download DER encode
ISE-ID.cert

Back to ISE
Add "Bind CA certificate" 
Selected the ISE-ID.cert
tick EAP and HTTPS
Save ok
Server will restart

MAB (MAC authentication bypass)

Some devices like phones, printers, ip cameras won't have 802.1x supplicant
We can hard code the MAC address

Printer tries dot1x
If that fails
Try MAB if the MAC is in the list then it will be allow

Source guard and DHCP snooping would be useful

We can re-order try MAB first the 802.1x. We can also try priority. If dot1x works we will use that. etc

Interface gig0/1
switchport mode access
authentication host-mode multi-auth
authentication open
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast


Let the ISE server know its sending over the mac address
This switch might be enabled or not
radius-server attribute 6 on-for-login-auth

May need, check debugs
radius-server attribute 25 on-for-login-auth

Shows the authentication details on that port
show authentication sessions int gig0/1

Enable MAB
Try mab first then dot1x
Use dot1x first if both are available

Interface gig0/1
mab
authentication order mab dot1x 
authentication priority dot1x mab

debug radius authentication

We need to setup the MAC addresses in the ISE

Admin -> identity management -> endpoints
add the MAC
xx:xx:xx:xx:xx:xx

We saw the server needed a reboot after adding the MAC addresses

Phones need the voice vlan domain permission

You can bulk import MAC's
Burger menu > Work Centres > Identities > import 
It gives a template for MAC addresses 


Interface range
To reconfig a log of ports into ISE conifg the interface range command can be useful to put in config and roll back

interface range g1/0/1 - 48, g2/0/1 - 48


Diagnostic tool
Menu > Operations > Troubleshoot > Diagnostic tools > Evaluate configuration validator 


May need to add the ISE server to ACL so it can SSH in
Fill in IP of switch
username password and enable
Check for AAA/dot1x and just pick 1 port to see switch conifg

The aaa stuff all errored as the radius group name was already in use
error on auth and acct port 

ip device tracking did not exist on my 9300

logging transport udp port did not either

Not sure about snmp-server host public (need more research, seem to work without)



Policy sets
Default is the default policy set.
Click the arrow > on the right to expand it

You will see:
  • Authentication policy
  • Authorization Policy - Local exceptions
  • Authorization Policy - Global exceptions
  • Authorization Policy - Local exceptions
Authentication policy
Expland the polocy with the arrow > on the left of the screen
You will see three sections
  • MAB
  • Dot1X
  • Default
For MAB we will have 
  • Wired_MAB
Options here:
If auth fail: Reject
If user not found: Continue
If process fail: Drop
  • Wireless_MAB
Options here:
If auth fail: Continue
If user not found: Continue
If process fail: Drop

  • Default
Options here:
If auth fail: Reject
If user not found: Reject
If process fail: Drop

Authorization Policy
In a basic setup we don't have the need for local/global exceptions so move onto Authorization Policy. Press the arrow > to expand.

There will be some default rules. Cisco phones should be handled automatically. If you have a non cisco phone system you will need to make your own rules regarding the voice vlan.

To setup a rule for non cisco phones we will have to make two items first. ID group with the phone mac addresses in it and auth result/profile (the action to apply).

Make a profile
Menu > Policy > Policy Elements > Results
Make "IP-Phones-Profile"
In "common tasks" Make sure to tick "voice domain permission"

We need to have created an identity group and populate with mac addresses of your phone vendor eg "IP-Phones"

Make the  "Permit-IP-Phones" rule

Now create our rule
IdentityGroup-Name equals Endpoint Identity Groups:IP-Phones 
and "Network_Access_Authentication_Passed

Assign a profile IP-Phone-Profile. We can't just use "PermitAccess" here because we need to grant access to the voice vlan.

ISE CLI commands:
show logging system ade/ADE.log tail
show application status ise

SFTP repo
Solarwinds SFTP server etc, need to listen on port 22 and have username and password
copy repository REPONAME file patch.tar.gz disk:/
You won't get any output of progress just wait

Upgrade
Go to latest patch in your version
Then upgrade to next major version and patch to recommended patch
You can use the command
application upgrade <upgrade bundle name> <repository name>
or
application upgrade prepare <upgrade bundle name> <repository name>
application upgrade proceed 
in sequence to upgrade a standalone node.

You can run:
application upgrade <upgrade bundle name> <repository name> command from the CLI on a standalone node that assumes the Administration, Policy Service, pxGrid, and Monitoring personas. If you choose to run this command directly, cisco recommend that you copy the upgrade bundle from the remote repository to the Cisco ISE node's local disk before you run the command to save time during upgrade.

Patch upgrade 
Only have one ISE tab open (there is a bug)
Maintenance > Patch Management > Install
Choose the patch file
Click install and wait, it may take 30 minutes, you won't get any output on screen just have to wait.

URT tool
Upload the urt bundle 
ssh into ise server
application install ise-urt.tar.gz LOCALDISK
This will test upgrade 
Will take a long time to complete as well but will give you and idea of how long the real upgrade will take.

Thursday, 13 July 2023

packet tracer not working well in FMC/FTD

Packet-tracer never worked well with VPN traffic, that was ok but now in FMC/FTD its also not working at all if you have snort or geoblocking rules. You will see an ip any any allow. Instead you must use the system support trace on live traffic. The whole point of packet tracer is that we don't always have live traffic or access to generate live traffic.


From cisco:

Indeed, from the packet tracer side it looks like the packet is going through in that IP permit any any, but that rule in reality does not exist.

Any rule which relies on snort will be classified by the box as a L4 permit ip any any, and unfortunately having a geodb rule looks like a snort rule for the box.


This is documented here:

https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/218196-understand-how-lina-rules-configured-wit.html

Rules with Snort Features Are Deployed As Permit Any Any

When you create a rule with features that are run by Snort side, like Geolocation, URL (Universal Resource Locator) filter, Application detection, etc, they are deployed on Lina side as a permit any any rule.

At a first glance, this can confuse you and make you think that the FTD allows all the traffic on that rule and stops the rule match verification for the rules that follow.

We also have an enhancement request for this: https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd00446


Unfortunately, this breaks the usage of the packet tracer feature, and in this case, you should rather use “> system support trace” if there is live traffic.


Tuesday, 11 July 2023

Some syslog event IDs related to AnyConnect on cisco ASA

302013 - built inbound connection

302014 - teardown TCP connection


725012 - Device chooses cipher for the SSL session with peer interface

725008 - ssl client propose cipher

725007 - teardown new ssl connection / terminated


725001 - starting ssl handsharek

725002 - ssl handsake completed

725003 - request to resume


113005 - AAA user authentication rejected

See:

https://www.cisco.com/c/en/us/support/docs/security/secure-client/221880-implement-hardening-measures-for-secure.html


Also:

http://www.cisco.com/en/US/docs/security/asa/asa82/system/message/logmsgs.html#wp4776913

716001 - anyconnect when user logs on
716002 - anyconnect when user logs off


Each connection that passes through the ASA is 9 syslogs so that will be a lot of logs


Old TAC sec pod cast

https://community.cisco.com/t5/security-knowledge-base/tac-security-podcast-show-information-and-episode-listing/ta-p/3126414


General syslog tips

Text zip's up well so you can zip before sending

Knowing the time frame of the issue helps any source / destination IPs

Notepad++ / sublime are good for working with big files

For really big files we really want a linux box

For windows users you can run a VM as well or install cygwin

User grep to look for sev1 events

grep "ASA-1-" ASASYSLOG.txt


Looks for sev 6 and pipe to head 

grep "ASA-6" ASAlogs.txt | head -n 3


-v can be used to remove items from the log

grep "ASA-6" ASAlogs.txt | grep -v "ASA-6-302011" | grep -v "ASA-6-302015" | head -n 3


We can build up our command adding more -v items

grep "ASA-6" ASAlogs.txt | grep -v "ASA-6-302011" | grep -v "ASA-6-302015" | grep -v "ASA-6-305011" | head -n 3

Other linux CLI tools that are very useful

count / sed / awk / uniq / sort / bc


To remove all the charactors on the line leading up to "Mar 28",  use the sed program to find and replace that text with "nothing":

cat ASAlogs.txt | sed 's/^.*Mar 28/Mar 28/g' | head -n 4


cut can be used to display something specific from each line:

grep "ASA-6-305011" ASAlogs.txt  | cut -f 13 -d ' '


<166>Mar 28 2013 08:22:50: %ASA-6-305011: Built dynamic TCP translation from inside:10.10.103.38/63894 to outside:192.168.124.149/63894

becomes

outside:192.168.124.149/61128



Now lets say you wanted to get rid of the 'outside' text at the start of each line. Use sed to replace that text with nothing:

grep "ASA-6-305011" ASAlogs.txt  | cut -f 13 -d ' ' | sed 's/outside://g'



When connection is torn down (teardown event) there is a byte count included

You could look for the initiator and the byte count

IP and how many bytes transfer

Then sort that based on byte count

This would give you talker


Sort by IP addresses 

Use bc to sum up all the ip and sort on byte counts and see which IP was the top talker over all


You could also work on top number of connections. Look for usernames instead of IP's etc. A ddos may make a lot of connections but small amount of data transfered 

You could look at denied connections



Tuesday, 28 February 2023

Cisco umbrella VA backoff

When the umbrella roaming client detects a VA on the LAN with it by default it will switch itself off and let the VA discover identity. Umbrella support said we can change this option.

https://support.umbrella.com/hc/en-us/articles/230901168#VirtualAppliance





Friday, 17 February 2023

packet capture on cisco ASA firewall with trace

Good capture option here for ASA

You can do a show trace on it and it goes though it like a packet tracer

capture capout2 type raw-data trace detail interface OUTSIDE include-decrypted match ip host 192.168.10.50 host 8.8.4.4

show capture capout2 trace detail packet-number 1


Wednesday, 18 January 2023

Cisco umbrella VA config


To configure Virtual appliance (VA), enter configuration mode (CTRL+B)

config va name umbrella01 (this name is just a label)

config va interface 172.16.0.6 255.255.255.0 172.16.0.1

config localdns add 172.16.0.8 (DC1)

config localdns add 172.16.0.9 (DC2)


From

https://docs.umbrella.com/deployment-umbrella/docs/appendix-d-troubleshooting-the-va-using-a-restricted-shell#section-use-configuration-mode-to-troubleshoot


Config auto updates

Need 2 VAs'

FW access to the URLS in setup doc

Config Deployments > Configuration > Sites and Active Directory.

Settings button top right

Auto upgrade


Wednesday, 7 December 2022

cisco webex softphone sign-in not working on cisco umbrella VA DNS servers

This is down to how cisco/webex resolves DNS. Depending on config it can be looking for external DNS records which need to resolve.


We already had an internal AD domain added (customer.com) in the umbrella dashboard as part of the internal domains.


On a working cap we saw it look for 

_collab-edge._tls.customer-ext.com which didn't resolve

Then it looked for

_cisco-uds._tcp.customer-ext.com

which did resolve to the customer ucm server IP's (this must have been resolve by internal DC/DNS)


On the "not working" capture

Wireshark showed a SRV record 

_cisco-uds._tcp.customer-ext.com was attempting to get resolved by the client but getting a "No such name" back from a public DNS server. It tried to resolve on the internet.


We needed to go into the DC and edit DNS on the external domain customer-ext.com

We also added the customer-ext.com to the internal domains in the umbrella dashboard.


Find DNS queries that didn't return an answer

(!(dns.flags.rcode==0))&&(dns.flags.response==1)  

Wednesday, 7 September 2022

can't ping SVI interface on remote switch across S2S VPN

 Had an issue could ping vlan1 (LAN) SVI but not vlan146 (VOICE)

The setup was

LAN client -> L2 VL1 -> L3 SVL VL1 -> Inside ASA -> S2S VPN -> HQ 

Phone client -> L2 VL146 -> L3SVI VL146 -> L3 SVI 1 -> Inside ASA-> S2S VPN -> HQ -> Phone server


I found some messed up NAT's


Removed the global

object network obj_any

 nat (any,outside) dynamic interface


The NoNat had a missing object in the destination

nat (voice,outside) source static obj-10.60.146.0 obj-10.60.146.0 destination static HQ-NET HQ-NETS no-proxy-arp route-lookup


Also needed this NAT on the INSIDE with the 146 networks to ping the SVI. This is becuase the route to the HQ network is through the inside interface of the ASA.

nat (inside,outside) source static obj-10.60.146.0 obj-10.60.146.0 destination static HQ-NET HQ-NETS no-proxy-arp route-lookup



Tuesday, 17 May 2022

Use windows DHCP server instead of IP pool for cisco anyconnect on cisco ASA

Connect to your anyconnect so you can see what tunnels/profiles are enabled

Use "show run tun" to see your tunnel config


Re-enable anyconnect

  • Disable anyconnect (so pool is not in use)
webvpn
no enable OUTSIDE

  • Remove the pool from the tunnel-group
tunnel-group STAFF general-attributes

no address-pool STAFF-POOL

  • Install enntry in the ‘Tunnel-Group’ for your AnyConnect

dhcp-server 10.60.1.6 10.60.1.7


  • Install entry in the AnyConnect ‘Group-Policy’ as well.

group-policy GP-STAFF attributes

dhcp-network-scope 10.60.6.0


  • Remove pool if no longer in use

no ip local pool STAFF-POOL


https://www.petenetlive.com/KB/Article/0001050


Saturday, 2 April 2022

Investigating high CPU usage on cisco ASA

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113185-asaperformance.html


http://www.tunnelsup.com/troubleshooting-high-cpu-on-a-cisco-asa

For FTD
show process cpu-usage sorted non-zero
show conn | include .*INSIDE .*DMZ
sh cpu usage

Generate TS file during issues, TAC said its ok to do but seems like it would push your CPU higher maybe there is a separate CPU for TS file generation.

Wednesday, 16 March 2022

pscp file to cisco router

I was trying to copy files to a cisco ASR 1001x router.

I was having issues due to internal FW rules etc. I could SSH so probably SCP would work.


I needed to enable the following command on the ASR router

ip scp server enable

However it still wasn't working.

I needed to run the pscp command on my server with the files with the -scp switch to force the old protocol

pscp -scp filename.bin username@x.x.x.x:filename.bin


I had to fill in the second filename.bin for the destination otherwise it would not work


Thursday, 3 March 2022

Firepower hotfix and patch schedule info

 When cisco find an issue they sometimes release a hotfix as a small quick fix.

The real fix will be put into the next maintenance release.


6.6 last FMC that supports cisco user agent ID. If you want to go above you need to uninstall useragent and install Cisco ISE-PIC agent

6.7.0 removes support for old ciphers. If you are using FTD you need to make sure all VPNs have been migrated to IKEv2 and updated ciphers.

ASA55xx-X devices only support up to certain sensor patches at time of writing 6.6.5.2

When you upgrade to 6.7.0 for example you should also upgrade to the latest release of 6.7.x at the time of writing it was 6.7.3 this ensures you get all fixes in your branch.

Because branches are worked on by different dev teams just because its fixed in 6.4.0.14 does not mean the same issue is fixed in 6.7.0 so you need to make sure to go to 6.7.3 or what ever is that latest patch in that branch




fmc error after upgrading to 6.7.3 interface modified

You get a health warning that interfaces are modified after upgrade to 6.7.3


SSH into FMC

enter "expert" mode

enter "sudo su"

Run this command

OmniQuery.pl -db mdb -e "select status,category,hex(uuid),body from notification where status=11;"

For each UUID delete the notification

OmniQuery.pl -db mdb -e 'delete from notification where uuid=unhex("XXXXXXXXXXXXXXXXXXXXXXXX");'

OmniQuery.pl -db mdb -e 'delete from notification where uuid=unhex("YYYYYYYYYYYYYYYYYYYYYYYY");'

OmniQuery.pl -db mdb -e 'delete from notification where uuid=unhex("ZZZZZZZZZZZZZZZZZZZZZZZZZZZZ");'


Check again, it should be blank

OmniQuery.pl -db mdb -e "select status,category,hex(uuid),body from notification where status=11;"


Check your FMC interface the alert should have cleared



show patch history on FMC CLI

 SSH to FMC

expert

cat /etc/sf/patch_history


This is useful for seeing hotfixes applied as they don't show in the version number in the web interface

Tuesday, 25 January 2022

2FA on FMC ASA and ASDM

- FMC:

https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214756-configure-duo-two-factor-authentication.html#anc7

However, kindly know that this document is describing access for Web users only and not CLI, as CLI access using SSO is not supported for CLI users:

https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/user_accounts_fmc.html#:~:text=SSO%20users%E2%80%94SSO%20users%20have%20web%20interface%20access%20only.


- ASA and ASDM:

Kindly know that ASA CLI and ASDM GUI authentication is only requiring the integration with an external party (e.g. ISE or NPS), however,  for ASA we can configure 2FA for VPN AnyConnect users as below:

https://community.cisco.com/t5/security-documents/configure-two-factor-authentication-on-asa-for-cisco-anyconnect/ta-p/3403768

https://duo.com/docs/sso-ciscoasa#:~:text=for%20each%20application.-,Configure%20Cisco%20ASA%20SSO,-Add%20Duo%20Single


But, if we want to use it for CLI access only without VPN, we could use RADIOUS with supposed to be previously configured:

https://community.duo.com/t/secure-cisco-asdm-with-mfa/7516/4



Accordingly, kindly note that directly configuration of 2FA is not yet supported over ASDM, and an enhancement request has been published to document this feature under bug ID (CSCvs85995):

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs85995



Duo service name and tests:

Duo Security Authentication Proxy Service

sc qc DuoAuthProxy

tasklist | findstr proxy_svc.exe

C:\Program Files\Duo Security Authentication Proxy\bin\proxy_svc.exe

Run a powershell as admin:

C:\Program Files\Duo Security Authentication Proxy\bin

.\authproxy_connectivity_tool.exe

Wednesday, 27 October 2021

FTD syslog event list

 https://www.cisco.com/c/en/us/td/docs/security/asa/syslog/b_syslog/syslogs1.html?bookSearch=true